Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ON
CYBER CRIME AND SECURITY
Defining Cyber Crime -
Computer crime or cybercrime, is any crime that involves a computer and a network.
Thecomputer may have been used in the commission of a crime, or it may be the target.
OR
Dr. Debarati Halder and Dr. K. Jaishankar define Cybercrimes as: "Offences that are
committed against individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause physical or mental harm, or loss,
to the victim directly or indirectly, using modern telecommunication networks such as
Internet (Chat rooms, emails, notice boards and groups) and mobile phones
(SMS/MMS)"
The illegal activity of cyber crime started just after the discovery of telephone and
telegraph. The given below is the list of the different cyber attacks :-
1834 - The world’s first cyberattack occured, in which a pair of thieves hacked the
French Telegraph System and steal financial market information.
1969 - The first virus attack is thought to be occured in this year in which an
anonymous person installed a program on a computer of the University of
Washington Computer Center. The inconspicuous program makes copies of itself
(breeding like a rabbit) until the computer overloads and stops working. The virus
wass named as Rabbit Virus.
1976 - The first spam email took place in this year when it was sent out over the
ARPANT.
There are many more cyber attacks that took place after these events which leads to the
formulation of laws for the cyber crime and different cyber security systems for the
protection of data.
References -
Digital Foernsics – By Dr. Jeetendra Pande, Dr. Ajay Prasad,
ISBN: 978-93-84813-94-9
Computer Forensics and Cyber Crime An Introduction – By Marjie T.
Britz
https://www.herjavecgroup.com/history-of-cybercrime/
https://www.phishing.org/what-is-phishing
https://www.cybercrimechambers.com/blog-bot-virus-dissemination--
124.php
https://www.slideshare.net/aemankhan/cybercrimeppt-27376284
https://www.educba.com/what-is-cyber-security/
http://www.crossdomainsolutions.com/cyber-security/tools-techniques/
https://www.vpnmentor.com/blog/report-biostar2-leak/
http://www.iibf.org.in/documents/Cyber-Laws-chapter-in-Legal-
Aspects-Book.pdf